PHD IT WRITTEN INTERVIEW QUESTIONS

PHD IT WRITTEN INTERVIEW QUESTIONS

PhD candidates should provide an authentic personal statement reflecting on their own personal interest. In the event that any outside resources are used, those should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. Applicants must answer each of the four prompts.

  1. What are your research interests in the area of Information Technology? Why are you inspired to research in this area, and why do you think it is important to research in this area?
  2. Why did you select PhD in Information Technology? Why did you select University of the Cumberlands?
  3. As an individual, what are your strengths and weaknesses and how will they impact you as a PhD IT student?
  4. Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from UC?

 Future of Health Care IT.

:  Future of Health Care IT.

With everything that we have covered so far in class, and what we read and see in the world around us, it is obvious that major changes are happening all around us. And, changes seem to be occurring at an ever increasing rate. As part of these changes, there will be changes in how healthcare is delivered to the society. Many new technologies are becoming available, although some are not yet in common use. These advancements are likely to result in cheaper, easier access to healthcare and new paradigms in healthcare delivery.

GROUP 4:  Do some web research and find a new or emerging technology that you believe will improve patient outcomes and/or improve the delivery of health care.  Explain what the technology is and how and why you believe it will improve patient outcomes and/or improve the delivery of health care.  Please put the name of the technology in your subject line and choose something that has not already been reported on by another student.

  1. Put the name of the technology in the Subject line for your posting.
  2. From your research, explain:
    1. What the technology is
    2. How and why you believe it will improve patient outcomes and/or improve the delivery of health care.

Briefly describe how a change management plan reduces the organization’s risk from known threats.

Cyber security tools are available to organizations requiring integration of its problem management, configuration management, and incident management processes.

The CEO and CIO have asked you to create an IRP and change management plan. These plans will help the organization choose the appropriate cyber security strategy and tools.

Part I: Incident Response Plan

Incident response is a disciplined methodology for managing the aftermath of a security breach, cyberattack, or some other security incident. An IRP provides an organization procedures that effectively limit the impact on the data, system, and business and reduces recovery time and overall cost.

Create a 1- to 2-page IRP using Microsoft Word for the organization you chose in Week 1. In your plan, ensure you:

  • Discuss roles and responsibilities.
  • Discuss the critical activities for each of the 5 phases in the incident response process.
  • List at least 3 cyber security tools that work together to monitor the organization’s network for malicious and abnormal activity.
Part II: Change Management Plan

Change management plans define the process for identifying, approving, implementing, and evaluating necessary changes due to new requirements, risks, patches, maintenance, and errors in the organization’s networked environment.

Create a 1- to 2-page Change Management Plan in Microsoft Word for your chosen organization. In your plan, ensure you discuss:

  • Roles and responsibilities
  • The use of swim lanes and callouts
  • Who should be involved in developing, testing, and planning
  • Who reviews and signs off on the change management requests

Briefly describe how a change management plan reduces the organization’s risk from known threats.

Part III: Cyber Security Tool Comparison

Create a 1- to 2-page table that compares two of the industry standard tools that integrate incident management and change management.

Recommend the best tool for the organization to the CEO and CIO based on the needs of the organization and what sector it is in. Explain how it maintains compliance with the organization’s regulatory requirements.

Format your all references and citations according to APA guidelines. Given that this is an academic assignment, additional research outside of the class materials to support the assertions in the document is expected.

Submit your assignment in a single Microsoft Word document.

 Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks). 

What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks).

I need 250 words without plagarisms.

2Q)

 

In the business environment, most companies or businesses rely on the computers wireless networks. This allows them to communicate vital information either to their clients, investors, suppliers or even internally between the manager and his subordinates or subordinates to subordinates. Information system security aims at protecting this information or information systems from unauthorized access, disruption, modification, disclosure, usage and destruction (Hossain et al., 2015).

The concerns that should be understood by individuals and companies about data transfer are the data security and data privacy as they try to send data via air through the wireless networks. Hackers have tried to penetrate network connections to spy, tamper and steal the information about companies, products, and customers and they can also change the information or make software’s dysfunction (Hossain et al., 2015).

Wireless Application Protocol

The wireless Application protocol is defined as a protocol in communication mostly for the purposes of data access wirelessly using networks of mobile wireless (Sarkar et al., 2016).

Pros

Wireless application protocol has enhanced the efficiency of data transfer since most of the of the network operators, hardware manufacturers and software application developers have worked to in co-operating WAP in their worldwide products in the bid of reaching as many users as possible. WAP has managed to add features like personalization and wireless telephony application which has improved the privacy level and users can even make calls using the application without needing to enter the telephone number. WAP is easier and cheaper to install especially in business setup since there is no need to buy and install internet cables. WAP offers a higher level of flexibility since the workers in an office-based wireless setup can network without sitting in a dedicated computer and be productive even while away from the office (Sarkar et al., 2016).

Cons

WAP is more exposed to attacks from unauthorized users who may tend to access information of individuals or companies requiring more expenses in security installations. WAP is slower and less efficient compared to wired networks and will, therefore, require a wired backbone network. WAP usually have a network coverage problem resulting in black sports where there are no signals for example in buildings with steel reinforcements. WAP has installation problems especially in areas where other wireless technologies are in use or radio interference exists which slows down the wireless communication (Sarkar et al., 2016).

REFERENCES:

Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.

Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.

I need  a response of above post with 150 words.

Thanks